General

  • Target

    Test.exe

  • Size

    494KB

  • Sample

    240701-m1apys1arq

  • MD5

    d91cf2ea58f9f71046b8f55eb7032640

  • SHA1

    649d5eff015dd35f3c29193bf2c4d86a9ad2517b

  • SHA256

    e620d6139593cb75beef54843dfca504b864f03a112bb1ece037ea2779a08452

  • SHA512

    518904cbeb378f122becc870f164643c2f0849f659b538462666158c0b0a151a5cd5f11213b84cdde3377d23d3f5275304cb7c47e408c18766749d00e31b8a9a

  • SSDEEP

    12288:loZ0L+EP8xx7vKInDAmZMK7bCP/dDhA/Nfg:gI837vKInDAmZMK7bCPVlA/Nfg

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1257273081182031882/S0f5S9J9F-zbhHDQlGlLhI6bgnP5WbUyKC9IXiZfUV5WJ7V1L7zhio2udcHS4IhuFInt

Targets

    • Target

      Test.exe

    • Size

      494KB

    • MD5

      d91cf2ea58f9f71046b8f55eb7032640

    • SHA1

      649d5eff015dd35f3c29193bf2c4d86a9ad2517b

    • SHA256

      e620d6139593cb75beef54843dfca504b864f03a112bb1ece037ea2779a08452

    • SHA512

      518904cbeb378f122becc870f164643c2f0849f659b538462666158c0b0a151a5cd5f11213b84cdde3377d23d3f5275304cb7c47e408c18766749d00e31b8a9a

    • SSDEEP

      12288:loZ0L+EP8xx7vKInDAmZMK7bCP/dDhA/Nfg:gI837vKInDAmZMK7bCPVlA/Nfg

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks